In the new documentary by Alex Gibney, an Oscar-winning filmmaker the phenomenon of Stuxnet is explored. A super worm discovered in 2010 by security researchers had one goal - to infect Iran's nuclear program. However, the worm ended up spreading uncontrollably.

In the United States alone more than 50% of ransomware victims have paid the extortionists according to a study conducted by Bitdefender in November 2015. Half of victims are willing to pay up to $500 to recover their data.

Vulnerabilities

HowTo Videos

First Stack Buffer Overflow to modify Variable

Stack overflow - modify program execution

Owning Windows Domain through MSSQL reverse shell

Demonstrating reverse shell attack on MSSQL

Dissecting the Dyre Loader

Dyre or Dyreza, is a pretty prominent figure in the world of financial malware. The Dyre of today comes loaded with a multitude of modules and features while also appearing to be well maintained. The first recorded instance of Dyre I have found is an article in June 2014 and the sample in question is version 1001, while at the time of this report Dyre is already up to version 1166. While the crypters and packers have varied over time, for at least the past 6 months Dyre has used the same loader to perform it's initial checks and injection sequence. It is the purpose of this report to go through the various techniques and algorithms present in the loader, and at times reverse them to python proof of concepts. » Full paper on Dissecting the Dyre Loader